- Methods used to ensure the security of networks; firewalls, anti-virus software, password and network user policies,authentication, encryption. 12 ATAR
- Is software that inspects incoming data for malware (dangerous files).
- Can be a server that filters incoming data from blacklisted IP addresses
- Can be a proxy server, the gatekeeper for what packets of data get in or out
- Can be software on your computer to protect who accesses your computer
- Can ban certain protocols, eg File Transfer Protocol (FTP) which can upload dangerous files to computers
- Is software used to protect your computer.
- It protects from spyware, worms, trojans, keyloggers and more.
- It reads files that come into your computer from the internet and if it recognises it as a virus, it will stop the file.
- Depending on how your anti-virus is setup, it could delete the file, or place it into quarantine.
- It is most important to update your anti-virus software with updates regularly, to stop new found viruses.
Password and Network User Policies
- A password is a previously setup comparison of your password on record, to the the one you type in to login.
- If it matches, you can login. If it doesn't match, you can't.
- A network user policy outlines how the network can be used by people.
- Usually students in a school will need to sign agreeing to the school network user policy.
- This is proving you are really you, to gain access to a network.
- All people on a network are given a user ID. Common ones are firstname.lastname
- At registration, you create a password that can later be used to login.
- Two factor authentication is available which can send a text message with a given number, which you need to type into the given text box. The two factors are firstly your password and secondly the number sent to a mobile or cell phone.
- Is a way to protect plain text data from being read.
- It is coded (now cyper-text), sent, then decoded, but only a person who has the correct key can decode it.
- Here is what a sentence in cypher-text looks like...
- Encryption Type 1 - Private Key - Encryption and decryption key are the same.
- Encryption - Type 2 - Public Key /Private Key - encryption or public key is available for anyone. But only the receiver can get the decryption key.
- More from wikipedia
Found an error or have an enhancement? Please let us know via this contact form